Mobile Security

Mobile security news, trends, analysis and practical advice

biometrics fingerscan smartphone
security light

samsung note7 iris setup

How it works: Iris scanning improves smartphone security

Samsung and other vendors are beginning to incorporate iris scanning into their mobile devices. We examine how this security technology works, its advantages and its drawbacks.

video

Samsung Galaxy Note7 iris scanner review

CIO.com's Al Sacco goes hands on with the Samsung Galaxy Note7 smartphone and its new biometric iris scanner.

original sale 4102 image

90% off Become an Ethical Hacker With This Complete eLearning Bundle - Deal Alert

With cyberattacks putting everyone on edge, companies are looking for ethical hackers--IT pros paid handsomely to hack their network, expose security flaws, and fix them before someone else breaks in. Learn the tools of the ethical...

150817 google marshmallow 06

Qualcomm-powered Android devices plagued by four rooting flaws

Hundreds of millions of Android devices based on Qualcomm chipsets are likely exposed to at least one of four critical vulnerabilities that allow non-privileged apps to take them over.

internet of things smart house

Your router won’t protect you when smartphones attack smart homes

Your home router, or firewall, won't protect you when smartphones attack smart homes.

Talent Acquisition Methods

Antivirus merger: Avast to buy AVG for $1.3 billion

Antivirus vendor Avast Software has agreed to buy rival AVG Technologies for $1.3 billion in cash.

Sundar Pichai

Google’s Sundar Pichai has been hacked; which CEO will be next?

Google CEO Sundar Pichai has become the latest tech executive to have a social media account hacked.

4 mastercard

MasterCard joins Visa in streamlining chip card processing

MasterCard announced plans similar to those made last week by Visa to speed up chip card in-store terminal testing and certification.

broken link breaching weakest link connection vulnerability 000004213740

AT&T and Samsung detail security gaps

In a global online survey of 800 enterprises conducted by IDC for AT&T, 60% said they had a security breach in 2015. Of that group, 42% said the breach had a significant negative impact on the business.

biometrics

Forget fingerprints; Iris scans could validate mobile payments

Newer biometrics technologies beyond the use of fingerprint scans could boost adoption rates for mobile payments.

school food chicken nuggets tray lunch school lunch food 000000723036

Hackers are ready to eat your app for LUNCH

These are some classic characteristics and traits of development teams that can signal trouble when it comes to building highly secure applications and services.

01 intro

7 ways to prevent mobile break-in

As mobile devices continue to penetrate our society, mobile security is becoming increasingly difficult to manage. Every mobile device we own, whether it’s a phone or a tablet, provides hackers with a new avenue to seize private...

insider threat

Review: New tools to fight insider threats

An entire industry has sprung up to provide a defense against insider threats. We tested products from Fortscale, Avanan, and PFU Systems, with each one concentrating on a different aspect of the problem.

FCC mobile phones FTC security

Obama agencies fight phone firms in vuln fix fails

Federales probing slow security by mobile phone carriers and ODMs. The FCC and FTC are tag-teaming to investigate non-existent or long-delayed OTA updates -- even when it's critical security vulnerabilities they patch...

CSO password management survival guide

The CSO password management survival guide

It's time to take the password problem in hand. This free guide from the editors of CSO will help you communicate the challenges and what is at stake and evaluate and choose the right enterprise password management solution for your...

video

Why passwords fail end users

At the 2016 Interop show, Network World got a quick demo of Keeper Security's password management and vault app. The company's CEO, Darren Guccione, also explained why most password methods fail end users, and whether biometrics...

A paranoid user with a laptop computer looks around suspiciously. [credit: Thinkstock]

5 secure habits of the paranoid PC user

Are you getting a little sloppy with your security? Time to shape up. Practice these five habits to protect your data at home, in the office and out in the world.

Android Apps Fingerprint Support

16 standout Android apps with fingerprint support

Take full advantage of your phone's fingerprint sensor with these genuinely useful fingerprint-ready apps.

Load More